US10754678B2 - Collaborative hosted virtual systems and methods - Google Patents

Collaborative hosted virtual systems and methods Download PDF

Info

Publication number
US10754678B2
US10754678B2 US15/823,791 US201715823791A US10754678B2 US 10754678 B2 US10754678 B2 US 10754678B2 US 201715823791 A US201715823791 A US 201715823791A US 10754678 B2 US10754678 B2 US 10754678B2
Authority
US
United States
Prior art keywords
virtual machine
hosted virtual
machine instance
computing device
particular hosted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US15/823,791
Other versions
US20190163510A1 (en
Inventor
Shyam Govardhan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Google LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to GOOGLE LLC reassignment GOOGLE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GOVARDHAN, SHYAM
Priority to US15/823,791 priority Critical patent/US10754678B2/en
Application filed by Google LLC filed Critical Google LLC
Priority to EP18826142.4A priority patent/EP3616389B1/en
Priority to PCT/US2018/062288 priority patent/WO2019108461A1/en
Priority to DK18826142.4T priority patent/DK3616389T3/en
Publication of US20190163510A1 publication Critical patent/US20190163510A1/en
Priority to US16/906,706 priority patent/US11550611B2/en
Publication of US10754678B2 publication Critical patent/US10754678B2/en
Application granted granted Critical
Priority to US17/090,487 priority patent/US11789765B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5077Logical partitioning of resources; Management or configuration of virtualized resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/22
    • H04L67/28
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45579I/O management, e.g. providing access to device drivers or storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45591Monitoring or debugging support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • This present disclosure generally relates to collaborative, hosted virtual devices, and more particularly to systems and methods for providing collaborative, hosted virtual devices.
  • Debugging is a process of finding and correcting errors in a computer program to make the program behave as expected.
  • certain errors may occur when improper calls are made to the hosting system (e.g., operating system or web browser). Such errors may be difficult for an application developer to detect. While support teams of the hosting system may be more easily able to detect these errors, application developers are often hesitant to share source code with the support teams.
  • traditional computing systems e.g., desktop computers
  • support teams utilize web tracking to record HTTP activity and detect errors.
  • mobile HTTP activity is often unobservable.
  • a method including: receiving, by a computing device, a request from a user device for access to a hosted virtual machine; dedicating, by the computing device, a port to forward a cast of a particular hosted virtual machine instance to the user device; establishing a connection between the user device and the particular hosted virtual machine instance through the dedicated port; receiving, by the computing device and from the user device, instructions to execute an application on the particular hosted virtual machine instance; logging external calls made by the particular hosted virtual machine instance; and transmitting, by the computer device, the log of external calls to be stored on a server, the logs being synced by the server with the user device in substantially real time.
  • the dedicated port may be simultaneously accessible by a plurality of user devices.
  • the method may further include: receiving, by the computing device, the compiled application from the user device; and initiating installation of the application within the particular hosted virtual machine instance.
  • the method may further include: wrapping, by the computing device, Transmission Control Protocol (TCP) data from the particular hosted virtual machine instance in web sockets; and transmitting, by the computing device and to the user device, the wrapped TCP data.
  • TCP Transmission Control Protocol
  • the method may further include: translating, by the computing device, the instructions from the computing device to TCP data; and sending the translated instructions to the particular hosted virtual machine instance.
  • Establishing the connection may include: connecting, by the computing device, to the user device through a reverse proxy, and connecting, by the computing device, to the particular hosted virtual machine instance through a secured tunnel.
  • the request from the user device may be received from a provisioning gateway, and the method may further include transmitting connection information to the provisioning gateway.
  • the particular hosted virtual machine instance may include a network proxy configured to detect all calls made by the particular hosted virtual machine instance and control the detected calls to be stored on the server.
  • the method may further include: upon receiving a first request from the user device for access to the hosted virtual machine, establishing a connection between the user device and a fresh instantiation of the hosted virtual machine as the particular hosted virtual machine instance, and upon receiving a second request from the user device for access to the hosted virtual machine, establishing a connection between the user device and the particular hosted virtual machine instance, the particular hosted virtual machine instance being persisted since receiving the first request.
  • the method may further include: receiving, by the computing device, a request from an external device for access to the particular hosted virtual machine instance; and establishing, by the computing device and with the external device, a connection between the external device and the particular hosted virtual machine instance through the dedicated port.
  • Establishing the connection between the user device and the particular hosted virtual machine instance may include connecting, by the computing device, to the user device through a first reverse proxy port.
  • Establishing the connection between the external device and the particular hosted virtual machine instance may include connecting, by the computing device, to the user device through a second reverse proxy port.
  • the first and second reverse proxy ports may be mapped to a same connection with the particular hosted virtual machine instance.
  • a method including: transmitting, by a computing device and to a provisioning gateway, a request for access to a hosted virtual machine; receiving, by the computing device, connection information to a first server; connecting to the first server based on the connection information; receiving, by the computing device and from the first server, a cast of a particular hosted virtual machine; transmitting, by the computing device and through the first server to the particular hosted virtual machine instance, instructions to execute an application on the particular hosted virtual machine instance; establishing, by the computing device, a connection with a second server; and receiving, by the computer device and from the second server, and in substantially real time, a log of external calls made by the particular hosted virtual machine instance in response to executing the application.
  • the method may further include transmitting, by the computing device and through the first server, a compiled application to the particular hosted virtual machine instance.
  • the instructions may include instructions to install and execute the compiled application on the particular hosted virtual machine instance.
  • the method may further include: rendering, by the computing device, the cast of the particular hosted virtual machine instance; and outputting for display the rendered cast and the log of external calls.
  • the rendered cast and log of external calls may be displayed on a same application screen.
  • the application may be a web application executed in a web browser.
  • the method may further include transmitting, in association with the request for access to a hosted virtual machine, a user identifier corresponding to a user of the computing device.
  • the particular hosted virtual machine instance is assigned to the user identifier.
  • the method may further include transmitting, in association with the request for access to a hosted virtual machine, an instance identifier corresponding to the particular hosted virtual machine instance.
  • a non-transitory computer readable medium having stored thereon computer program instructions that, when executed by a processor, control the processor to: output for transmission, to a provisioning gateway, a request for access to a hosted virtual machine; receive, from the provisioning gateway, connection information to a first server; connect to the first server based on the connection information; receive, from the first server over the dedicated port, a cast of a particular hosted virtual machine instance; output for transmission, to the particular hosted virtual machine instance and through the first server, instructions to execute an application on the particular hosted virtual machine instance; establish, a connection with a second server; and receive, from the second server and in substantially real time, a log of external calls made by the particular hosted virtual machine instance in response to executing the application.
  • the instructions may further control the processor to: render the cast of the particular hosted virtual machine instance; and output for display the rendered cast together with the log of external calls.
  • FIG. 1 is an example environment for implementing certain aspects of the present disclosure.
  • FIG. 2 illustrates example screens of an application executed on the user device.
  • FIG. 3 is a timing diagram of an implementation of certain elements of the present disclosure according to an example embodiment.
  • FIG. 4 a block diagram of an example computer system capable of implementing certain aspects of the present disclosure.
  • certain aspects of the disclosure provide cloud-based virtual machines with built-in tools for tracking traffic.
  • the virtual machines may be accessed collaboratively, in real-time, and the traffic generated therein can be observed using the built-in tools.
  • a server dedicates a port for casting an instance of a hosted virtual machine, and translates data exchanged between the instance and an accessing web application executing on a user device.
  • the built-in tools track traffic generated by the instance and upload the tracked traffic, in real-time, to a server.
  • the user device accesses this information from the server.
  • the hosted virtual machine may be accessed collaboratively, such that a third-party (e.g., support staff) may view the virtual machine in real-time, and review the traffic generated by the instance of the virtual machine.
  • a third-party e.g., support staff
  • FIG. 1 illustrates an example environment for implementing certain aspects of the present disclosure.
  • the environment 100 includes a user device 110 , a provisioning gateway 130 , a middleware server 150 , a virtual instance host 170 , and a traffic database 190 .
  • the user device 110 is configured to request access to a virtual instance from the provisioning gateway 130 .
  • the provisioning gateway 130 facilitates a connection between the middleware server 150 by requesting a virtual instance.
  • the middleware server 150 provides the user device 110 a cast of the virtual instance from the virtual instance host 170 and provide input from the user device 110 to the virtual instance host 170 .
  • the middleware server may create a tunnel (e.g., secure shell (SSH) tunnel) with the virtual instance host 170 and convert between transmission control protocol (TCP) layer protocols received from the virtual instance host 170 and WebSockets sent to the user device 110 .
  • the virtual instance host 170 hosts instances of the virtual machine.
  • the virtual instance host 170 may create virtual machine instances or instance groups using a template.
  • the virtual machine instances include traffic tracking tools that monitor traffic (e.g., HTML traffic) generated by the virtual machine instance. The tools upload the tracked traffic to the traffic database 190 .
  • the traffic database 190 shares the traffic with the user device 110 .
  • the user device 110 may combine the traffic information received from the traffic database 190 with the cast of the virtual machine received from the middleware server 150 .
  • the traffic database 190 is a real-time database, configured to synchronize, in real time or near real time, the traffic with the user device 110 .
  • the traffic database 190 further includes one or more of the following: configuration information on particular virtual machine instances; user information associated with particular virtual machine instances, including permissions or leases; and mapping information for the middleware server 150 (e.g., connection information for particular user devices 110 or user accounts).
  • the data may be stored in the traffic database 190 using a hierarchical database model.
  • the traffic database 190 may be a non-SQL database.
  • functionality of the provisioning gateway 130 , middleware server 150 , virtual instance host 170 , and traffic database 190 may be implemented on a single physical device or implemented across one or more devices.
  • FIG. 2 illustrates example screens of an application executed on the user device 110 .
  • An initiation screen 210 includes an option to select virtual device and operating system configurations.
  • the virtual device is a virtual mobile device (e.g., an Android device).
  • the application controls a request access to a virtual instance be sent from the user device 110 to the provisioning gateway 130 , as described above.
  • An execution screen 220 illustrates an example application screen when accessing a virtual instance.
  • the virtual instance may be cast on a portion of the application screen and interacted with through the screen.
  • tracked traffic information received from the traffic database 190 may be organized and displayed. As a user of the user device 110 interacts with the virtual instance, the traffic may be automatically updated to reflect the interaction.
  • the application may be a web application accessed via a web browser.
  • FIG. 3 is a timing diagram of an example implementation of the present disclosure.
  • a user device 110 transmits 305 a request for a virtual machine instance to the provisioning gateway 130 .
  • the request may be transmitted 305 in response to receiving an indication from a user to launch a virtual machine instance.
  • the request may be sent automatically by the user device 110 in response to launching an application (e.g., a web application).
  • an application e.g., a web application
  • the provisioning gateway requests 310 the middleware server 150 to provide connection information.
  • the middleware server 150 establishes 315 a connection with a virtual machine instance executing on the virtual instance host 170 .
  • the middleware server 150 establishes 315 an SSH tunnel connection with a virtual machine instance, and establish a forward port to cast the virtual machine instance.
  • the middleware server 150 provides 320 , to the provisioning gateway 130 , the connection information for the forward port.
  • the middleware server 150 may utilize a reverse proxy, and the connection information may be connection information to a forward port of the reverse proxy.
  • the provisioning gateway 130 provides 325 the connection information to the user device 110 , and the user device 110 establishes 330 a connection with the middleware server 150 using the connection information.
  • the virtual instance host 170 sends 335 a cast of the virtual machine instance to the middleware server 150 over the connection.
  • the virtual host 170 sends 335 cast data in a TCP layer protocol.
  • the middleware server 150 converts 340 the cast data to a web protocol and sends 345 the converted cast data to the user device 345 .
  • the middleware server 150 may format the cast data into sockets (e.g., wrap the cast data within WebSockets) and send 345 the sockets to the user device 110 .
  • the user device 110 displays 350 the cast of the virtual machine instance and receives user input for the virtual machine instance.
  • the user device 110 may display 350 a rendering of a GUI of the virtual machine instance and receive user input instructing the instance to execute an application.
  • the instructions may include installing an application on the virtual machine.
  • the application may be compiled on the user device 110 , and executable files may be delivered to the virtual machine from the user device 110 through the middleware server 150 .
  • the user device 110 transmits 355 instructions corresponding to the user input to the middleware server 150 .
  • the middleware server 150 converts 360 the instructions to be understandable by the virtual machine instance, for example, converting the instructions from WebSockets to a TCP layer protocol.
  • the middleware server 150 sends 365 the converted instructions to the virtual instance host 170 .
  • the virtual instance host 170 executes 370 the instructions within the virtual machine instance and captures 375 traffic generated by executing the instructions.
  • the virtual instance host 170 uploads 380 the captured traffic to the traffic database 190 .
  • the virtual machine instance may run a native network layer proxy that intercepts all calls made by the virtual machine instance and uploads the intercepted calls to the traffic database 190 .
  • the traffic database 190 may store the uploaded traffic data correlated with an identification of the particular virtual machine instance.
  • the traffic database 190 may then transmit 385 the stored traffic generated by the virtual machine instance to the user device 110 , which displays 390 the traffic information with the cast of the virtual machine instance.
  • the traffic data provided to the user device 110 may be raw data.
  • the network proxy may detect patterns in the traffic data and format the data accordingly.
  • the network proxy may upload the raw data to the traffic database 190 , and the traffic database may format the data based on rules and patterns.
  • a fresh instantiation of the virtual machine may be accessed each time user device 110 requests an instance of the virtual machine.
  • the virtual instance host 170 may maintain a pool of virtual machine instances that may be assigned.
  • a particular virtual machine instance may be associated with a particular user device 110 or user account.
  • the user device 110 may submit a user identifier or device identifier to the provisioning gateway 130 together with the request for an instance of the virtual machine.
  • a particular virtual machine instance may be tied to the user or device identifier, each time the user or user device 110 requests an instance from the provisioning gateway 130 , the user accesses a same virtual machine.
  • the correlation may be stored in the traffic database 190 .
  • a user account may be required to access a virtual machine instance, and the virtual machine instance may be tied to the user account.
  • a fresh instantiation of the virtual machine may be assigned to the user or user device 110 for a certain time period (e.g., a lease term). For example, a particular instance of a virtual machine may be assigned to a particular user or user device 110 for two weeks after accessing the virtual machine.
  • the lease term may be renewable by re-accessing the particular virtual machine instance.
  • the particular virtual machine instance will be deleted, and a new instantiation may be created.
  • a plurality of virtual machine instances may be assigned to a same user device 110 or user account.
  • the application executing on the user device 110 may include a user interface for selecting a particular virtual machine instance, and may control the user device 110 to request access to the selected instance from the provisioning gateway 130 .
  • a particular virtual machine instance may be accessed simultaneously by a plurality of user devices 110 .
  • a developer may upload an application onto a particular virtual machine instance, and allow a support team to view the virtual machine and review the traffic data.
  • each virtual machine instance may be uniquely identifiable.
  • the traffic database 190 may store the traffic data linked with an identifier of the respective virtual machine instance.
  • the support team may access a cast of the particular virtual machine instance from the middleware server 150 and the stored traffic data from the traffic database 190 while the developer is accessing the particular virtual machine interest.
  • the same connections between the middleware server 150 and the virtual instance host 170 may be used by both the user device 110 and the support team.
  • the application executing on the user device 110 may include a user interface element for sharing a particular virtual machine instance with a third party.
  • the application may include a text field to input an e-mail address of a third party, and the application may output instructions to provide access to the instance to the holder of the e-mail address.
  • the middleware server 150 may provide a first connection between the user device 110 and the reverse proxy, and a second connection between the third party's user device 110 and the review proxy, both connections being mapped to the particular instance of the virtual machine.
  • FIG. 4 illustrates an example computing device architecture than can implement one or more of the user device 110 , provisioning gateway 130 , middleware server 150 , virtual instance host 170 , and traffic database 190 .
  • the user device 110 , provisioning gateway 130 , middleware server 150 , virtual instance host 170 , and traffic database 190 may have fewer, alternative, or additional components as that illustrated in FIG. 4 .
  • the computing device architecture 400 of FIG. 4 includes a central processing unit (CPU) 402 , where computer instructions are processed, and a display interface 404 that acts as a communication interface and provides functions for rendering video, graphics, images, and texts on the display.
  • the display interface 404 may be directly connected to a local display, such as a touch-screen display associated with a mobile computing device.
  • the display interface 404 may be configured for providing data, images, and other information for an external/remote display 450 that is not necessarily physically connected to the mobile computing device.
  • a desktop monitor may be used for mirroring graphics and other information that is presented on a mobile computing device.
  • the display interface 404 may wirelessly communicate, for example, via a Wi-Fi channel or other available network connection interface 412 to the external/remote display 450 .
  • the network connection interface 412 may be configured as a communication interface and may provide functions for digital virtual assistant using voice, rendering video, graphics, images, text, other information, or any combination thereof on the display.
  • a communication interface may include a microphone, camera, serial port, a parallel port, a general-purpose input and output (GPIO) port, a game port, a universal serial bus (USB), a micro-USB port, a high definition multimedia (HDMI) port, a video port, an audio port, a Bluetooth port, a near-field communication (NFC) port, another like communication interface, or any combination thereof.
  • the display interface 404 may be operatively coupled to a local display, such as a touch-screen display associated with a mobile device or voice enabled device.
  • the display interface 404 may be configured to provide video, graphics, images, text, other information, or any combination thereof for an external/remote display 450 that is not necessarily connected to the mobile computing device.
  • a desktop monitor may be used for mirroring or extending graphical information that may be presented on a mobile device.
  • the display interface 404 may wirelessly communicate, for example, via the network connection interface 412 such as a Wi-Fi transceiver to the external/remote display 450 .
  • the computing device architecture 400 may include a keyboard interface 406 that provides a communication interface to a keyboard.
  • the computing device architecture 400 may include a presence sensitive input interface 408 for connecting to a presence sensitive display 407 .
  • the presence sensitive input interface 408 may provide a communication interface to various devices such as a pointing device, a touch screen, a depth camera, microphone, etc. which may or may not be associated with a display.
  • the computing device architecture 400 may be configured to use an input device via one or more of input/output interfaces (for example, the keyboard interface 406 , the display interface 404 , the presence sensitive input interface 408 , network connection interface 412 , camera interface 414 , sound interface 416 , etc.) to allow a user to capture information into the computing device architecture 400 .
  • the input device may include a mouse, a trackball, a directional pad, a track pad, a touch-verified track pad, a presence-sensitive track pad, a presence-sensitive display, a scroll wheel, a digital camera, a digital video camera, a web camera, a microphone, a sensor, a smartcard, and the like.
  • the input device may be integrated with the computing device architecture 400 or may be a separate device.
  • the input device may be an accelerometer, a magnetometer, a digital camera, a microphone, and an optical sensor.
  • Example implementations of the computing device architecture 400 may include an antenna interface 410 that provides a communication interface to an antenna; a network connection interface 412 that provides a communication interface to a network.
  • the display interface 404 may be in communication with the network connection interface 412 , for example, to provide information for display on a remote display that is not directly connected or attached to the system.
  • camera interface 414 acts as a communication interface and provides functions for capturing digital images from a camera.
  • a sound interface 416 is provided as a communication interface for converting sound into electrical signals using a microphone and for converting electrical signals into sound using a speaker.
  • a sound interface 416 is utilized to capture voice inputs for consumption by of other components connected to the BUS 434 .
  • a random-access memory (RAM) 418 is provided, where computer instructions and data may be stored in a volatile memory device for processing by the CPU 402 .
  • the computing device architecture 400 includes a read-only memory (ROM) 420 where invariant low-level system code or data for basic system functions such as basic input and output (I/O), startup, or reception of keystrokes from a keyboard are stored in a non-volatile memory device.
  • ROM read-only memory
  • I/O basic input and output
  • the computing device architecture 400 includes a storage medium 422 or other suitable type of memory (e.g.
  • the computing device architecture 400 includes a power source 430 that provides an appropriate alternating current (AC) or direct current (DC) to power components.
  • AC alternating current
  • DC direct current
  • the computing device architecture 400 includes a telephony subsystem 432 that allows the computing device to transmit and receive sound over a telephone network.
  • the constituent devices and the CPU 402 communicate with each other over a bus 434 .
  • the CPU 402 has appropriate structure to be a computer processor.
  • the CPU 402 may include more than one processing unit.
  • the RAM 418 interfaces with the computer BUS 434 to provide quick RAM storage to the CPU 402 during the execution of software programs such as the operating system application programs, and device drivers. More specifically, the CPU 402 loads computer-executable process steps from the storage medium 422 or other media into a field of the RAM 418 to execute software programs. Data may be stored in the RAM 418 , where the data may be accessed by the computer CPU 402 during execution.
  • the storage medium 422 itself may include a number of physical drive units, such as a redundant array of independent disks (RAID), a floppy disk drive, a flash memory, a USB flash drive, an external hard disk drive, thumb drive, pen drive, key drive, a High-Density Digital Versatile Disc (HD-DVD) optical disc drive, an internal hard disk drive, a Blu-Ray optical disc drive, or a Holographic Digital Data Storage (HDDS) optical disc drive, an external mini-dual in-line memory module (DIMM) synchronous dynamic random access memory (SDRAM), or an external micro-DIMM SDRAM.
  • RAID redundant array of independent disks
  • HD-DVD High-Density Digital Versatile Disc
  • HD-DVD High-Density Digital Versatile Disc
  • HD-DVD High-Density Digital Versatile Disc
  • HDDS Holographic Digital Data Storage
  • DIMM mini-dual in-line memory module
  • SDRAM synchronous dynamic random access memory
  • Such computer readable storage media allow a computing device to access computer-executable process steps, application programs and the like, stored on removable and non-removable memory media, to off-load data from the device or to upload data onto the device.
  • a computer program product such as one utilizing a communication system may be tangibly embodied in storage medium 422 , which may include a machine-readable storage medium.
  • the term computing device may be a CPU, or conceptualized as a CPU (for example, the CPU 402 of FIG. 4 ).
  • the computing device (CPU) may be coupled, connected, and/or in communication with one or more peripheral devices, such as display.
  • the term computing device may refer to a mobile computing device such as a smart phone, tablet computer, or smart watch.
  • the computing device may output content to its local display and/or speaker(s).
  • the computing device may output content to an external display device (e.g., over Wi-Fi) such as a TV or an external computing system.
  • a computing device may include any number of hardware and/or software applications that are executed to facilitate any of the operations.
  • one or more I/O interfaces may facilitate communication between the computing device and one or more input/output devices.
  • a universal serial bus port, a serial port, a disk drive, a CD-ROM drive, and/or one or more user interface devices such as a display, keyboard, keypad, mouse, control panel, touch screen display, microphone, etc.
  • the one or more I/O interfaces may be used to receive or collect data and/or user instructions from a wide variety of input devices. Received data may be processed by one or more computer processors as desired in various implementations of the disclosed technology and/or stored in one or more memory devices.
  • One or more network interfaces may facilitate connection of the computing device inputs and outputs to one or more suitable networks and/or connections; for example, the connections that facilitate communication with any number of sensors associated with the system.
  • the one or more network interfaces may further facilitate connection to one or more suitable networks; for example, a local area network, a wide area network, the Internet, a cellular network, a radio frequency network, a Bluetooth enabled network, a Wi-Fi enabled network, a satellite-based network any wired network, any wireless network, etc., for communication with external devices and/or systems.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A method including: receiving, by a computing device, a request from a user device for access to a hosted virtual machine; dedicating, by the computing device, a port to forward a cast of a particular hosted virtual machine instance to the user device; establishing a connection between the user device and the particular hosted virtual machine instance through the dedicated port; receiving, by the computing device and from the user device, instructions to execute an application on the particular hosted virtual machine instance; logging external calls made by the particular hosted virtual machine instance; and transmitting, by the computer device, the log of external calls to be stored on a server, the logs being synced by the server with the user device in substantially real time.

Description

TECHNICAL FIELD
This present disclosure generally relates to collaborative, hosted virtual devices, and more particularly to systems and methods for providing collaborative, hosted virtual devices.
BACKGROUND
Debugging is a process of finding and correcting errors in a computer program to make the program behave as expected. With application development, certain errors may occur when improper calls are made to the hosting system (e.g., operating system or web browser). Such errors may be difficult for an application developer to detect. While support teams of the hosting system may be more easily able to detect these errors, application developers are often hesitant to share source code with the support teams. In traditional computing systems (e.g., desktop computers), support teams utilize web tracking to record HTTP activity and detect errors. However, implementing web tracking in mobile environments is more difficult, and mobile HTTP activity is often unobservable. Further, it may not be possible to verify client configurations and setups for mobile environments, and source code of applications executing on a mobile device is frequently private. Therefore, it is often difficult to provide support to mobile application developers.
Accordingly, there is a need for improved tools to assist in application development and in detecting errors in the code.
SUMMARY
According to certain aspects of the present disclosure, there is provided a method including: receiving, by a computing device, a request from a user device for access to a hosted virtual machine; dedicating, by the computing device, a port to forward a cast of a particular hosted virtual machine instance to the user device; establishing a connection between the user device and the particular hosted virtual machine instance through the dedicated port; receiving, by the computing device and from the user device, instructions to execute an application on the particular hosted virtual machine instance; logging external calls made by the particular hosted virtual machine instance; and transmitting, by the computer device, the log of external calls to be stored on a server, the logs being synced by the server with the user device in substantially real time.
The dedicated port may be simultaneously accessible by a plurality of user devices.
The method may further include: receiving, by the computing device, the compiled application from the user device; and initiating installation of the application within the particular hosted virtual machine instance.
The method may further include: wrapping, by the computing device, Transmission Control Protocol (TCP) data from the particular hosted virtual machine instance in web sockets; and transmitting, by the computing device and to the user device, the wrapped TCP data.
The method may further include: translating, by the computing device, the instructions from the computing device to TCP data; and sending the translated instructions to the particular hosted virtual machine instance.
Establishing the connection may include: connecting, by the computing device, to the user device through a reverse proxy, and connecting, by the computing device, to the particular hosted virtual machine instance through a secured tunnel.
The request from the user device may be received from a provisioning gateway, and the method may further include transmitting connection information to the provisioning gateway.
The particular hosted virtual machine instance may include a network proxy configured to detect all calls made by the particular hosted virtual machine instance and control the detected calls to be stored on the server.
The method may further include: upon receiving a first request from the user device for access to the hosted virtual machine, establishing a connection between the user device and a fresh instantiation of the hosted virtual machine as the particular hosted virtual machine instance, and upon receiving a second request from the user device for access to the hosted virtual machine, establishing a connection between the user device and the particular hosted virtual machine instance, the particular hosted virtual machine instance being persisted since receiving the first request.
The method may further include: receiving, by the computing device, a request from an external device for access to the particular hosted virtual machine instance; and establishing, by the computing device and with the external device, a connection between the external device and the particular hosted virtual machine instance through the dedicated port.
Establishing the connection between the user device and the particular hosted virtual machine instance may include connecting, by the computing device, to the user device through a first reverse proxy port. Establishing the connection between the external device and the particular hosted virtual machine instance may include connecting, by the computing device, to the user device through a second reverse proxy port. The first and second reverse proxy ports may be mapped to a same connection with the particular hosted virtual machine instance.
According to certain aspects of the present disclosure, there is provided a method including: transmitting, by a computing device and to a provisioning gateway, a request for access to a hosted virtual machine; receiving, by the computing device, connection information to a first server; connecting to the first server based on the connection information; receiving, by the computing device and from the first server, a cast of a particular hosted virtual machine; transmitting, by the computing device and through the first server to the particular hosted virtual machine instance, instructions to execute an application on the particular hosted virtual machine instance; establishing, by the computing device, a connection with a second server; and receiving, by the computer device and from the second server, and in substantially real time, a log of external calls made by the particular hosted virtual machine instance in response to executing the application.
The method may further include transmitting, by the computing device and through the first server, a compiled application to the particular hosted virtual machine instance. The instructions may include instructions to install and execute the compiled application on the particular hosted virtual machine instance.
The method may further include: rendering, by the computing device, the cast of the particular hosted virtual machine instance; and outputting for display the rendered cast and the log of external calls.
The rendered cast and log of external calls may be displayed on a same application screen.
The application may be a web application executed in a web browser.
The method may further include transmitting, in association with the request for access to a hosted virtual machine, a user identifier corresponding to a user of the computing device. The particular hosted virtual machine instance is assigned to the user identifier.
The method may further include transmitting, in association with the request for access to a hosted virtual machine, an instance identifier corresponding to the particular hosted virtual machine instance.
According to certain aspects of the present disclosure, there is provided a non-transitory computer readable medium having stored thereon computer program instructions that, when executed by a processor, control the processor to: output for transmission, to a provisioning gateway, a request for access to a hosted virtual machine; receive, from the provisioning gateway, connection information to a first server; connect to the first server based on the connection information; receive, from the first server over the dedicated port, a cast of a particular hosted virtual machine instance; output for transmission, to the particular hosted virtual machine instance and through the first server, instructions to execute an application on the particular hosted virtual machine instance; establish, a connection with a second server; and receive, from the second server and in substantially real time, a log of external calls made by the particular hosted virtual machine instance in response to executing the application.
The instructions may further control the processor to: render the cast of the particular hosted virtual machine instance; and output for display the rendered cast together with the log of external calls.
BRIEF DESCRIPTION OF THE FIGURES
Reference will now be made to the accompanying figures, which are not necessarily drawn to scale, and wherein:
FIG. 1 is an example environment for implementing certain aspects of the present disclosure.
FIG. 2 illustrates example screens of an application executed on the user device.
FIG. 3 is a timing diagram of an implementation of certain elements of the present disclosure according to an example embodiment.
FIG. 4 a block diagram of an example computer system capable of implementing certain aspects of the present disclosure.
DETAILED DESCRIPTION
The present disclosure can be understood more readily by reference to the following detailed description of exemplary embodiments and the examples included herein. It is to be understood that embodiments are not limited to those described within this disclosure. Numerous modifications and variations therein will be apparent to those skilled in the art and remain within the scope of the disclosure. It is also to be understood that the specific terminology used herein is for describing specific embodiments only and is not intended to be limiting. Some embodiments of the disclosed technology will be described more fully hereinafter with reference to the accompanying drawings. This disclosed technology may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth therein.
To address these issues, certain aspects of the disclosure provide cloud-based virtual machines with built-in tools for tracking traffic. The virtual machines may be accessed collaboratively, in real-time, and the traffic generated therein can be observed using the built-in tools. In some embodiments, a server dedicates a port for casting an instance of a hosted virtual machine, and translates data exchanged between the instance and an accessing web application executing on a user device. The built-in tools track traffic generated by the instance and upload the tracked traffic, in real-time, to a server. The user device accesses this information from the server. The hosted virtual machine may be accessed collaboratively, such that a third-party (e.g., support staff) may view the virtual machine in real-time, and review the traffic generated by the instance of the virtual machine.
Referring now to the figures, FIG. 1 illustrates an example environment for implementing certain aspects of the present disclosure. The environment 100 includes a user device 110, a provisioning gateway 130, a middleware server 150, a virtual instance host 170, and a traffic database 190. The user device 110 is configured to request access to a virtual instance from the provisioning gateway 130. The provisioning gateway 130 facilitates a connection between the middleware server 150 by requesting a virtual instance.
The middleware server 150 provides the user device 110 a cast of the virtual instance from the virtual instance host 170 and provide input from the user device 110 to the virtual instance host 170. In some cases, the middleware server may create a tunnel (e.g., secure shell (SSH) tunnel) with the virtual instance host 170 and convert between transmission control protocol (TCP) layer protocols received from the virtual instance host 170 and WebSockets sent to the user device 110. The virtual instance host 170 hosts instances of the virtual machine. In some cases, the virtual instance host 170 may create virtual machine instances or instance groups using a template. The virtual machine instances include traffic tracking tools that monitor traffic (e.g., HTML traffic) generated by the virtual machine instance. The tools upload the tracked traffic to the traffic database 190.
The traffic database 190 shares the traffic with the user device 110. The user device 110 may combine the traffic information received from the traffic database 190 with the cast of the virtual machine received from the middleware server 150. In some implementations, the traffic database 190 is a real-time database, configured to synchronize, in real time or near real time, the traffic with the user device 110. In some embodiments, the traffic database 190 further includes one or more of the following: configuration information on particular virtual machine instances; user information associated with particular virtual machine instances, including permissions or leases; and mapping information for the middleware server 150 (e.g., connection information for particular user devices 110 or user accounts). In some cases, the data may be stored in the traffic database 190 using a hierarchical database model. In some implementations, the traffic database 190 may be a non-SQL database.
As will be understood by one of ordinary skill, in some embodiments functionality of the provisioning gateway 130, middleware server 150, virtual instance host 170, and traffic database 190 may be implemented on a single physical device or implemented across one or more devices.
FIG. 2 illustrates example screens of an application executed on the user device 110. An initiation screen 210 includes an option to select virtual device and operating system configurations. In some embodiments, the virtual device is a virtual mobile device (e.g., an Android device). When a device configuration is selected and “Start Cloud Instance” is selected, the application controls a request access to a virtual instance be sent from the user device 110 to the provisioning gateway 130, as described above. An execution screen 220 illustrates an example application screen when accessing a virtual instance. The virtual instance may be cast on a portion of the application screen and interacted with through the screen. On a separate portion of the application screen, tracked traffic information received from the traffic database 190 may be organized and displayed. As a user of the user device 110 interacts with the virtual instance, the traffic may be automatically updated to reflect the interaction. The application may be a web application accessed via a web browser.
FIG. 3 is a timing diagram of an example implementation of the present disclosure. A user device 110 transmits 305 a request for a virtual machine instance to the provisioning gateway 130. As a non-limiting example, the request may be transmitted 305 in response to receiving an indication from a user to launch a virtual machine instance. In some cases, the request may be sent automatically by the user device 110 in response to launching an application (e.g., a web application).
The provisioning gateway requests 310 the middleware server 150 to provide connection information. The middleware server 150 establishes 315 a connection with a virtual machine instance executing on the virtual instance host 170. As a non-limiting example, the middleware server 150 establishes 315 an SSH tunnel connection with a virtual machine instance, and establish a forward port to cast the virtual machine instance. The middleware server 150 provides 320, to the provisioning gateway 130, the connection information for the forward port. In some embodiments, the middleware server 150 may utilize a reverse proxy, and the connection information may be connection information to a forward port of the reverse proxy. The provisioning gateway 130 provides 325 the connection information to the user device 110, and the user device 110 establishes 330 a connection with the middleware server 150 using the connection information.
The virtual instance host 170 sends 335 a cast of the virtual machine instance to the middleware server 150 over the connection. As a non-limiting example, the virtual host 170 sends 335 cast data in a TCP layer protocol. The middleware server 150 converts 340 the cast data to a web protocol and sends 345 the converted cast data to the user device 345. As a non-limiting example, the middleware server 150 may format the cast data into sockets (e.g., wrap the cast data within WebSockets) and send 345 the sockets to the user device 110.
The user device 110 displays 350 the cast of the virtual machine instance and receives user input for the virtual machine instance. For example, the user device 110 may display 350 a rendering of a GUI of the virtual machine instance and receive user input instructing the instance to execute an application. In some cases, the instructions may include installing an application on the virtual machine. The application may be compiled on the user device 110, and executable files may be delivered to the virtual machine from the user device 110 through the middleware server 150. The user device 110 transmits 355 instructions corresponding to the user input to the middleware server 150. The middleware server 150 converts 360 the instructions to be understandable by the virtual machine instance, for example, converting the instructions from WebSockets to a TCP layer protocol. The middleware server 150 sends 365 the converted instructions to the virtual instance host 170.
The virtual instance host 170 executes 370 the instructions within the virtual machine instance and captures 375 traffic generated by executing the instructions. The virtual instance host 170 uploads 380 the captured traffic to the traffic database 190. As a non-limiting example, the virtual machine instance may run a native network layer proxy that intercepts all calls made by the virtual machine instance and uploads the intercepted calls to the traffic database 190. The traffic database 190 may store the uploaded traffic data correlated with an identification of the particular virtual machine instance. The traffic database 190 may then transmit 385 the stored traffic generated by the virtual machine instance to the user device 110, which displays 390 the traffic information with the cast of the virtual machine instance.
In some embodiments, the traffic data provided to the user device 110 may be raw data. In some embodiments, the network proxy may detect patterns in the traffic data and format the data accordingly. In some embodiments, the network proxy may upload the raw data to the traffic database 190, and the traffic database may format the data based on rules and patterns.
In some embodiments, a fresh instantiation of the virtual machine (e.g., created from a template without modifications by a user device 110) may be accessed each time user device 110 requests an instance of the virtual machine. In some cases, the virtual instance host 170 may maintain a pool of virtual machine instances that may be assigned. In some implementations, a particular virtual machine instance may be associated with a particular user device 110 or user account. For example, the user device 110 may submit a user identifier or device identifier to the provisioning gateway 130 together with the request for an instance of the virtual machine. A particular virtual machine instance may be tied to the user or device identifier, each time the user or user device 110 requests an instance from the provisioning gateway 130, the user accesses a same virtual machine. In some embodiments, the correlation may be stored in the traffic database 190. In some implementations, a user account may be required to access a virtual machine instance, and the virtual machine instance may be tied to the user account.
In some cases, upon a first request for a virtual machine instance, a fresh instantiation of the virtual machine may be assigned to the user or user device 110 for a certain time period (e.g., a lease term). For example, a particular instance of a virtual machine may be assigned to a particular user or user device 110 for two weeks after accessing the virtual machine. The lease term may be renewable by re-accessing the particular virtual machine instance. In some cases, once the lease term expires, the particular virtual machine instance will be deleted, and a new instantiation may be created.
In some cases, a plurality of virtual machine instances may be assigned to a same user device 110 or user account. The application executing on the user device 110 may include a user interface for selecting a particular virtual machine instance, and may control the user device 110 to request access to the selected instance from the provisioning gateway 130.
According to some embodiments, a particular virtual machine instance may be accessed simultaneously by a plurality of user devices 110. For example, a developer may upload an application onto a particular virtual machine instance, and allow a support team to view the virtual machine and review the traffic data. In some embodiments, each virtual machine instance may be uniquely identifiable. The traffic database 190 may store the traffic data linked with an identifier of the respective virtual machine instance. The support team may access a cast of the particular virtual machine instance from the middleware server 150 and the stored traffic data from the traffic database 190 while the developer is accessing the particular virtual machine interest. In some implementations, the same connections between the middleware server 150 and the virtual instance host 170 may be used by both the user device 110 and the support team.
In some implementations, the application executing on the user device 110 may include a user interface element for sharing a particular virtual machine instance with a third party. For example, the application may include a text field to input an e-mail address of a third party, and the application may output instructions to provide access to the instance to the holder of the e-mail address. For example, the middleware server 150 may provide a first connection between the user device 110 and the reverse proxy, and a second connection between the third party's user device 110 and the review proxy, both connections being mapped to the particular instance of the virtual machine.
FIG. 4 illustrates an example computing device architecture than can implement one or more of the user device 110, provisioning gateway 130, middleware server 150, virtual instance host 170, and traffic database 190. In some embodiments, the user device 110, provisioning gateway 130, middleware server 150, virtual instance host 170, and traffic database 190 may have fewer, alternative, or additional components as that illustrated in FIG. 4.
The computing device architecture 400 of FIG. 4 includes a central processing unit (CPU) 402, where computer instructions are processed, and a display interface 404 that acts as a communication interface and provides functions for rendering video, graphics, images, and texts on the display. In certain example implementations of the disclosed technology, the display interface 404 may be directly connected to a local display, such as a touch-screen display associated with a mobile computing device. In another example implementation, the display interface 404 may be configured for providing data, images, and other information for an external/remote display 450 that is not necessarily physically connected to the mobile computing device. For example, a desktop monitor may be used for mirroring graphics and other information that is presented on a mobile computing device. In certain example implementations, the display interface 404 may wirelessly communicate, for example, via a Wi-Fi channel or other available network connection interface 412 to the external/remote display 450.
In an example implementation, the network connection interface 412 may be configured as a communication interface and may provide functions for digital virtual assistant using voice, rendering video, graphics, images, text, other information, or any combination thereof on the display. In one example, a communication interface may include a microphone, camera, serial port, a parallel port, a general-purpose input and output (GPIO) port, a game port, a universal serial bus (USB), a micro-USB port, a high definition multimedia (HDMI) port, a video port, an audio port, a Bluetooth port, a near-field communication (NFC) port, another like communication interface, or any combination thereof. In one example, the display interface 404 may be operatively coupled to a local display, such as a touch-screen display associated with a mobile device or voice enabled device. In another example, the display interface 404 may be configured to provide video, graphics, images, text, other information, or any combination thereof for an external/remote display 450 that is not necessarily connected to the mobile computing device. In one example, a desktop monitor may be used for mirroring or extending graphical information that may be presented on a mobile device. In another example, the display interface 404 may wirelessly communicate, for example, via the network connection interface 412 such as a Wi-Fi transceiver to the external/remote display 450.
The computing device architecture 400 may include a keyboard interface 406 that provides a communication interface to a keyboard. In one example implementation, the computing device architecture 400 may include a presence sensitive input interface 408 for connecting to a presence sensitive display 407. According to certain example implementations of the disclosed technology, the presence sensitive input interface 408 may provide a communication interface to various devices such as a pointing device, a touch screen, a depth camera, microphone, etc. which may or may not be associated with a display.
The computing device architecture 400 may be configured to use an input device via one or more of input/output interfaces (for example, the keyboard interface 406, the display interface 404, the presence sensitive input interface 408, network connection interface 412, camera interface 414, sound interface 416, etc.) to allow a user to capture information into the computing device architecture 400. The input device may include a mouse, a trackball, a directional pad, a track pad, a touch-verified track pad, a presence-sensitive track pad, a presence-sensitive display, a scroll wheel, a digital camera, a digital video camera, a web camera, a microphone, a sensor, a smartcard, and the like. Additionally, the input device may be integrated with the computing device architecture 400 or may be a separate device. For example, the input device may be an accelerometer, a magnetometer, a digital camera, a microphone, and an optical sensor.
Example implementations of the computing device architecture 400 may include an antenna interface 410 that provides a communication interface to an antenna; a network connection interface 412 that provides a communication interface to a network. As mentioned above, the display interface 404 may be in communication with the network connection interface 412, for example, to provide information for display on a remote display that is not directly connected or attached to the system. In certain implementations, camera interface 414 acts as a communication interface and provides functions for capturing digital images from a camera. In certain implementations, a sound interface 416 is provided as a communication interface for converting sound into electrical signals using a microphone and for converting electrical signals into sound using a speaker. In certain implementations, a sound interface 416 is utilized to capture voice inputs for consumption by of other components connected to the BUS 434. According to example implementations, a random-access memory (RAM) 418 is provided, where computer instructions and data may be stored in a volatile memory device for processing by the CPU 402.
According to an example implementation, the computing device architecture 400 includes a read-only memory (ROM) 420 where invariant low-level system code or data for basic system functions such as basic input and output (I/O), startup, or reception of keystrokes from a keyboard are stored in a non-volatile memory device. According to an example implementation, the computing device architecture 400 includes a storage medium 422 or other suitable type of memory (e.g. such as RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives), where the files include an operating system 424, application programs 426 (including, for example, a web browser application, a widget or gadget engine, and or other applications, as necessary) and data files 428 are stored. According to an example implementation, the computing device architecture 400 includes a power source 430 that provides an appropriate alternating current (AC) or direct current (DC) to power components.
According to an example implementation, the computing device architecture 400 includes a telephony subsystem 432 that allows the computing device to transmit and receive sound over a telephone network. The constituent devices and the CPU 402 communicate with each other over a bus 434.
According to an example implementation, the CPU 402 has appropriate structure to be a computer processor. In one arrangement, the CPU 402 may include more than one processing unit. The RAM 418 interfaces with the computer BUS 434 to provide quick RAM storage to the CPU 402 during the execution of software programs such as the operating system application programs, and device drivers. More specifically, the CPU 402 loads computer-executable process steps from the storage medium 422 or other media into a field of the RAM 418 to execute software programs. Data may be stored in the RAM 418, where the data may be accessed by the computer CPU 402 during execution.
The storage medium 422 itself may include a number of physical drive units, such as a redundant array of independent disks (RAID), a floppy disk drive, a flash memory, a USB flash drive, an external hard disk drive, thumb drive, pen drive, key drive, a High-Density Digital Versatile Disc (HD-DVD) optical disc drive, an internal hard disk drive, a Blu-Ray optical disc drive, or a Holographic Digital Data Storage (HDDS) optical disc drive, an external mini-dual in-line memory module (DIMM) synchronous dynamic random access memory (SDRAM), or an external micro-DIMM SDRAM. Such computer readable storage media allow a computing device to access computer-executable process steps, application programs and the like, stored on removable and non-removable memory media, to off-load data from the device or to upload data onto the device. A computer program product, such as one utilizing a communication system may be tangibly embodied in storage medium 422, which may include a machine-readable storage medium.
According to one example implementation, the term computing device, as used herein, may be a CPU, or conceptualized as a CPU (for example, the CPU 402 of FIG. 4). In this example implementation, the computing device (CPU) may be coupled, connected, and/or in communication with one or more peripheral devices, such as display. In another example implementation, the term computing device, as used herein, may refer to a mobile computing device such as a smart phone, tablet computer, or smart watch. In this example implementation, the computing device may output content to its local display and/or speaker(s). In another example implementation, the computing device may output content to an external display device (e.g., over Wi-Fi) such as a TV or an external computing system.
In example implementations of the disclosed technology, a computing device may include any number of hardware and/or software applications that are executed to facilitate any of the operations. In example implementations, one or more I/O interfaces may facilitate communication between the computing device and one or more input/output devices. For example, a universal serial bus port, a serial port, a disk drive, a CD-ROM drive, and/or one or more user interface devices, such as a display, keyboard, keypad, mouse, control panel, touch screen display, microphone, etc., may facilitate user interaction with the computing device. The one or more I/O interfaces may be used to receive or collect data and/or user instructions from a wide variety of input devices. Received data may be processed by one or more computer processors as desired in various implementations of the disclosed technology and/or stored in one or more memory devices.
One or more network interfaces may facilitate connection of the computing device inputs and outputs to one or more suitable networks and/or connections; for example, the connections that facilitate communication with any number of sensors associated with the system. The one or more network interfaces may further facilitate connection to one or more suitable networks; for example, a local area network, a wide area network, the Internet, a cellular network, a radio frequency network, a Bluetooth enabled network, a Wi-Fi enabled network, a satellite-based network any wired network, any wireless network, etc., for communication with external devices and/or systems.
In the present description, numerous specific details are set forth. However, it is to be understood that embodiments of the disclosed technology may be practiced without these specific details. In other instances, well-known methods, structures, and techniques have not been shown in detail in order not to obscure an understanding of this description. References to “one embodiment,” “an embodiment,” “example embodiment,” “some embodiments,” “certain embodiments,” “various embodiments,” etc., indicate that the embodiment(s) of the disclosed technology so described may include a particular feature, structure, or characteristic, but not every embodiment necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrase “in one embodiment” does not necessarily refer to the same embodiment, although it may.
Unless otherwise noted, the terms used herein are to be understood according to conventional usage by those of ordinary skill in the relevant art. In addition to any definitions of terms provided below, it is to be understood that as used in the specification and in the claims, “a” or “an” can mean one or more, depending upon the context in which it is used. Throughout the specification and the claims, the following terms take at least the meanings explicitly associated herein, unless the context clearly dictates otherwise. The term “or” is intended to mean an inclusive “or.” Further, the terms “a,” “an,” and “the” are intended to mean one or more unless specified otherwise or clear from the context to be directed to a singular form.
Unless otherwise specified, the use of the ordinal adjectives “first,” “second,” “third,” etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
Also, in describing example embodiments, certain terminology is used for the sake of clarity. It is intended that each term contemplates its broadest meaning as understood by those skilled in the art and includes all technical equivalents that operate in a similar manner to accomplish a similar purpose.
While certain embodiments of the disclosed technology have been described, it is to be understood that the disclosed technology is not to be limited to the disclosed example embodiments, but covers various modifications and equivalent arrangements included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This written description uses examples to disclose certain embodiments of the disclosed technology, including the best mode, and to enable any person skilled in the art to practice the disclosed technology, including making and using any devices or systems and performing any incorporated methods. The patentable scope may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements as the claims, or if they include equivalent structural elements with insubstantial differences from the literal language of the claims.

Claims (20)

What is claimed is:
1. A method comprising:
receiving, by a computing device, a request from a user device for access to a hosted virtual machine;
dedicating, by the computing device, a port to forward a cast of a particular hosted virtual machine instance to the user device;
establishing a connection between the user device and the particular hosted virtual machine instance through the dedicated port;
receiving, by the computing device and from the user device, instructions to execute an application on the particular hosted virtual machine instance;
logging external calls made by the particular hosted virtual machine instance in response to executing the application in a log; and
transmitting, by the computer device, the log of external calls to be stored on a server, the log being synced by the server with the user device in substantially real time.
2. The method of claim 1, wherein the dedicated port is capable of being simultaneously accessible by a plurality of user devices.
3. The method of claim 1, wherein the method further comprises:
receiving, by the computing device, the compiled application from the user device; and
initiating installation of the application within the particular hosted virtual machine instance.
4. The method of claim 1 further comprising:
wrapping, by the computing device, Transmission Control Protocol (TCP) data from the particular hosted virtual machine instance in web sockets; and
transmitting, by the computing device and to the user device, the wrapped TCP data.
5. The method of claim 4 further comprising:
translating, by the computing device, the instructions from the computing device to TCP data; and
sending the translated instructions to the particular hosted virtual machine instance.
6. The method of claim 1, wherein establishing the connection comprises:
connecting, by the computing device, to the user device through a reverse proxy, and
connecting, by the computing device, to the particular hosted virtual machine instance through a secured tunnel.
7. The method of claim 1, wherein
the request from the user device is received from a provisioning gateway, and
the method further comprises transmitting connection information to the provisioning gateway.
8. The method of claim 1, wherein the particular hosted virtual machine instance includes a network proxy configured to detect all calls made by the particular hosted virtual machine instance and control the detected calls to be stored on the server.
9. The method of claim 1 further comprising:
upon receiving a first request from the user device for access to the hosted virtual machine, establishing a connection between the user device and a fresh instantiation of the hosted virtual machine as the particular hosted virtual machine instance, and
upon receiving a second request from the user device for access to the hosted virtual machine, establishing a connection between the user device and the particular hosted virtual machine instance, the particular hosted virtual machine instance being persisted since receiving the first request.
10. The method of claim 1, further comprising:
receiving, by the computing device, a request from an external device for access to the particular hosted virtual machine instance; and
establishing, by the computing device and with the external device, a connection between the external device and the particular hosted virtual machine instance through the dedicated port.
11. The method of claim 10, wherein
establishing the connection between the user device and the particular hosted virtual machine instance comprises connecting, by the computing device, to the user device through a first reverse proxy port,
establishing the connection between the external device and the particular hosted virtual machine instance comprises connecting, by the computing device, to the user device through a second reverse proxy port, and
the first and second reverse proxy ports are mapped to a same connection with the particular hosted virtual machine instance.
12. A method comprising:
transmitting, by a computing device and to a provisioning gateway, a request for access to a hosted virtual machine;
receiving, by the computing device, connection information to a first server;
connecting to the first server, by the computing device, based on the connection information;
receiving, by the computing device and from the first server, a cast of a particular hosted virtual machine instance;
transmitting, by the computing device and through the first server to the particular hosted virtual machine instance, instructions to execute an application on the particular hosted virtual machine instance;
establishing, by the computing device, a connection with a second server; and
logging external calls made by the particular hosted virtual machine instance, in response to executing the application in a log;
receiving, by the computing device, and from the second server, and in substantially real time, the log of external calls made by the particular hosted virtual machine.
13. The method of claim 12, further comprising transmitting, by the computing device and through the first server, a compiled application to the particular hosted virtual machine instance, wherein the instructions comprise instructions to install and execute the compiled application on the particular hosted virtual machine instance.
14. The method of claim 12 further comprising:
rendering, by the computing device, the cast of the particular hosted virtual machine instance; and
outputting for display the rendered cast and the log of external calls.
15. The method of claim 14, wherein the rendered cast and log of external calls are displayed on a same application screen.
16. The method of claim 15, wherein the application is a web application executed in a web browser.
17. The method of claim 12, further comprising transmitting, in association with the request for access to a hosted virtual machine, a user identifier corresponding to a user of the computing device, wherein the particular hosted virtual machine instance is assigned to the user identifier.
18. The method of claim 17, further comprising transmitting, in association with the request for access to a hosted virtual machine, an instance identifier corresponding to the particular hosted virtual machine instance.
19. A non-transitory computer readable medium having stored thereon computer program instructions that, when executed by a processor, control the processor to:
output for transmission, to a provisioning gateway, a request for access to a hosted virtual machine;
receive, from the provisioning gateway, connection information to a first server;
connect to the first server based on the connection information;
receive, from the first server over a dedicated port, a cast of a particular hosted virtual machine instance;
output for transmission, to the particular hosted virtual machine instance and through the first server, instructions to execute an application on the particular hosted virtual machine instance;
establish, a connection with a second server;
log external calls made by the particular hosted virtual machine instance in response to executing the application in a log; and
receive, from the second server and in substantially real time, the log of external calls made by the particular hosted virtual machine instance.
20. The non-transitory computer readable medium of claim 19, wherein the instructions for control of the processor are further configured to cause the processor to:
render the cast of the particular hosted virtual machine instance; and
output for display the rendered cast together with the log of external calls.
US15/823,791 2017-11-28 2017-11-28 Collaborative hosted virtual systems and methods Active 2037-12-23 US10754678B2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US15/823,791 US10754678B2 (en) 2017-11-28 2017-11-28 Collaborative hosted virtual systems and methods
EP18826142.4A EP3616389B1 (en) 2017-11-28 2018-11-21 Collaborative hosted virtual systems and methods
PCT/US2018/062288 WO2019108461A1 (en) 2017-11-28 2018-11-21 Collaborative hosted virtual systems and methods
DK18826142.4T DK3616389T3 (en) 2017-11-28 2018-11-21 COLLABORATIVE HOSTED VIRTUAL SYSTEMS AND RELATED METHODS
US16/906,706 US11550611B2 (en) 2017-11-28 2020-06-19 Collaborative hosted virtual systems and methods
US17/090,487 US11789765B2 (en) 2017-11-28 2020-11-05 Collaborative hosted virtual systems and methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/823,791 US10754678B2 (en) 2017-11-28 2017-11-28 Collaborative hosted virtual systems and methods

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/906,706 Continuation US11550611B2 (en) 2017-11-28 2020-06-19 Collaborative hosted virtual systems and methods

Publications (2)

Publication Number Publication Date
US20190163510A1 US20190163510A1 (en) 2019-05-30
US10754678B2 true US10754678B2 (en) 2020-08-25

Family

ID=64870566

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/823,791 Active 2037-12-23 US10754678B2 (en) 2017-11-28 2017-11-28 Collaborative hosted virtual systems and methods
US16/906,706 Active 2038-02-09 US11550611B2 (en) 2017-11-28 2020-06-19 Collaborative hosted virtual systems and methods
US17/090,487 Active 2038-09-20 US11789765B2 (en) 2017-11-28 2020-11-05 Collaborative hosted virtual systems and methods

Family Applications After (2)

Application Number Title Priority Date Filing Date
US16/906,706 Active 2038-02-09 US11550611B2 (en) 2017-11-28 2020-06-19 Collaborative hosted virtual systems and methods
US17/090,487 Active 2038-09-20 US11789765B2 (en) 2017-11-28 2020-11-05 Collaborative hosted virtual systems and methods

Country Status (4)

Country Link
US (3) US10754678B2 (en)
EP (1) EP3616389B1 (en)
DK (1) DK3616389T3 (en)
WO (1) WO2019108461A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10956234B2 (en) * 2018-11-30 2021-03-23 Graphcore Limited Virtualised gateways
US11140212B2 (en) 2019-01-24 2021-10-05 KLDiscovery Ontrack, LLC Monitoring and reporting usage of standalone e-discovery machine

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11184364B2 (en) * 2018-01-09 2021-11-23 Cisco Technology, Inc. Localized, proximity-based media streaming
CN112398685B (en) * 2020-11-04 2024-01-19 腾讯科技(深圳)有限公司 Host equipment acceleration method, device, equipment and medium based on mobile terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007111A1 (en) 2007-06-27 2009-01-01 Vmware, Inc. Logging and replaying input/output events for a virtual machine
US20090320011A1 (en) 2008-06-20 2009-12-24 Vmware, Inc. Accelerating replayed program execution to support decoupled program analysis
US20140033200A1 (en) 2009-07-21 2014-01-30 Adobe Systems Incorporated Method and system to provision and manage a computing application hosted by a virtual instance of a machine
US20140173591A1 (en) * 2012-12-13 2014-06-19 Cisco Technology, Inc. Differentiated service levels in virtualized computing
US20140304326A1 (en) 2013-04-09 2014-10-09 Citrix Systems, Inc. Providing a native desktop using cloud-synchronized data
US20160292061A1 (en) 2015-04-06 2016-10-06 Microsoft Technology Licensing, Llc Time travel debugging for browser components
US9747120B2 (en) * 2010-06-18 2017-08-29 At&T Intellectual Property I, L.P. Mobile device with virtual interfaces
US10037223B2 (en) * 2015-04-01 2018-07-31 Electronics And Telecommunications Research Institute Method and system for providing virtual desktop service using cache server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9569232B1 (en) * 2013-02-19 2017-02-14 Amazon Technologies, Inc. Network traffic data in virtualized environments
US10637738B1 (en) * 2017-05-26 2020-04-28 Amazon Technologies, Inc. Network traffic logs with integrated product identifiers

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007111A1 (en) 2007-06-27 2009-01-01 Vmware, Inc. Logging and replaying input/output events for a virtual machine
US20090320011A1 (en) 2008-06-20 2009-12-24 Vmware, Inc. Accelerating replayed program execution to support decoupled program analysis
US20140033200A1 (en) 2009-07-21 2014-01-30 Adobe Systems Incorporated Method and system to provision and manage a computing application hosted by a virtual instance of a machine
US9569240B2 (en) * 2009-07-21 2017-02-14 Adobe Systems Incorporated Method and system to provision and manage a computing application hosted by a virtual instance of a machine
US9747120B2 (en) * 2010-06-18 2017-08-29 At&T Intellectual Property I, L.P. Mobile device with virtual interfaces
US20140173591A1 (en) * 2012-12-13 2014-06-19 Cisco Technology, Inc. Differentiated service levels in virtualized computing
US20140304326A1 (en) 2013-04-09 2014-10-09 Citrix Systems, Inc. Providing a native desktop using cloud-synchronized data
US9641599B2 (en) * 2013-04-09 2017-05-02 Citrix Systems, Inc. Providing a native desktop using cloud-synchronized data
US10037223B2 (en) * 2015-04-01 2018-07-31 Electronics And Telecommunications Research Institute Method and system for providing virtual desktop service using cache server
US20160292061A1 (en) 2015-04-06 2016-10-06 Microsoft Technology Licensing, Llc Time travel debugging for browser components

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
International Preliminary Report on Patentability for International Application No. PCT/US2018/062288 dated Jun. 11, 2020. 16 pages.
International Search Report and Written Opinion dated Feb. 21, 2019 in International (PCT) Application No. PCT/US2018/062288.
Naik et al. "Securing Information by Performing Forensic and Network Analysis on Hosted Virtualization", 2014 IEEE, 7 pages. *
Salomoni et al. "A Dynamic Virtual Networks Solution for Cloud Computing", 2013 IEEE, pp. 526-534. *
Szentiványi et al. "Aspects for Improvement of Performance in Fault-Tolerant Software", 2004 IEEE, 9 pages. *
Xiangiang et al. "SyncViews: Toward Consistent User Views in Cloud-based File Synchronization Services", 2011 IEEE, pp. 89-96. *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10956234B2 (en) * 2018-11-30 2021-03-23 Graphcore Limited Virtualised gateways
US11281506B2 (en) * 2018-11-30 2022-03-22 Graphcore Limited Virtualised gateways
US11140212B2 (en) 2019-01-24 2021-10-05 KLDiscovery Ontrack, LLC Monitoring and reporting usage of standalone e-discovery machine
US11178208B2 (en) 2019-01-24 2021-11-16 KLDiscovery Ontrack, LLC Automatic initialization process for standalone e-discovery machine
US11190574B2 (en) * 2019-01-24 2021-11-30 KLDiscoveryOntrack, LLC Integrated VPN capabilities in standalone e-discovery machine

Also Published As

Publication number Publication date
US20190163510A1 (en) 2019-05-30
WO2019108461A1 (en) 2019-06-06
EP3616389A1 (en) 2020-03-04
EP3616389B1 (en) 2023-03-29
US11789765B2 (en) 2023-10-17
US20210173691A1 (en) 2021-06-10
DK3616389T3 (en) 2023-07-03
US20210011752A1 (en) 2021-01-14
US11550611B2 (en) 2023-01-10

Similar Documents

Publication Publication Date Title
US11550611B2 (en) Collaborative hosted virtual systems and methods
US10949158B2 (en) Screenshot method and apparatus
US9645910B1 (en) Cross platform mobile HTML debugging
US9652364B1 (en) Cloud service for mobile testing and debugging
US20160330266A1 (en) Remotely controlling a device via a web browser
US11452151B2 (en) Application function implementation method and electronic device
EP3075147B1 (en) Method for remote monitoring, and system for signal capturing and remote monitoring
US20230388294A1 (en) Two-Factor Authentication Systems And Methods
WO2014048250A1 (en) Termininal interaction methods and related devices and systems
US20140082051A1 (en) Virtual file transmission system and method of transmitting virtual file thereof
KR20120096741A (en) Virtual device cloud network system and method for providing applications on heterogeneous device platform
US20220092143A1 (en) Device Augmentation Of Real Time Communications
CN113709243A (en) Equipment remote control method and device, electronic equipment and storage medium
US20200389675A1 (en) Electronic device for sharing real-time content data
US9819725B1 (en) System, method, and computer program for remotely controlling mobile web applications installed on a mobile device
KR20150084413A (en) Application error detection method for cloud streaming service, apparatus and system therefor
KR20140101622A (en) Method for testing server for cloud streaming service, system and apparatus thereof
US20140089432A1 (en) Terminal interaction methods and related devices and systems
US20180222054A1 (en) Method for remotely accessing a remote device from a user device via an intermediate device
US10505800B2 (en) Method for real-time activation of receiver module
Liu et al. Supporting audio streaming in application cloud for embedded systems
US9213842B2 (en) Tracing data block operations
US9065814B2 (en) Translation between telephone device and network client
US20160065532A1 (en) Systems and methods for adaptive associative routing for mobile messaging
US10045146B2 (en) Wireless display that accesses remote resources for display data

Legal Events

Date Code Title Description
AS Assignment

Owner name: GOOGLE LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GOVARDHAN, SHYAM;REEL/FRAME:044233/0056

Effective date: 20171127

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4